System and method for analyzing malicious code protocol and generating harmful traffic

a malicious code protocol and malicious code technology, applied in the field of method and system for analyzing malicious code protocols and generating harmful traffic, can solve the problem that the package driver actually generates harmful traffi

Inactive Publication Date: 2006-06-15
CHOI BYEONG CHEOL +1
View PDF1 Cites 117 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The packet driver actually generates harmful traffic using the packet information constructed by the packet protocol configuration unit, network vulnerability scanning unit and attack protocol configuration unit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for analyzing malicious code protocol and generating harmful traffic
  • System and method for analyzing malicious code protocol and generating harmful traffic
  • System and method for analyzing malicious code protocol and generating harmful traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will now be described more fully with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown. The invention may, however, be embodied in many different forms, and should not be construed as being limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. Throughout the drawings, like reference numerals refer to like elements.

[0022]FIG. 1 is a block diagram of a system for analyzing a malicious code protocol and generating harmful traffic according to an embodiment of the present invention. Referring to FIG. 1, the system includes a malicious code protocol analyzer 100 and a harmful traffic generator 150.

[0023] The harmful traffic generator 150 generates harmful traffic for testing a network security system. The harmful traffic generator 150 includes a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The provided method and system is a method and system for analyzing the malicious code protocol and generating harmful traffic. The harmful traffic generating method constructs packet protocol information for generating a first attack packet corresponding to the TCP / IP protocol for generating network traffic, and then sets network vulnerability scanning for generating a second attack packet for carrying out network vulnerability scanning. Subsequently, the method constructs attack information for generating a third attack packet in the form of denial of service, and generates harmful traffic using the packet protocol information, network vulnerability scanning and attack information. Accordingly, performance testing of the network security system against malicious code attacks such as the Internet worm can be performed.

Description

[0001] This application claims the priority of Korean Patent Application No. 10-2004-0095547, filed on Nov. 20, 2004, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein in its entirety by reference. BACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] The present invention relates to a method and system for analyzing a malicious code protocol and generating harmful traffic, which tests and measures the performance of a network security system. [0004] 2. Description of the Related Art [0005] Malicious code includes worm, virus, back door, trojan horse, malware, adware, and so on. Harmful traffic is the attack traffic generated by the malicious code and other attack signatures. [0006] Conventional malicious code protocol analysis is carried out by checking whether an attack pattern corresponding to previously known malicious code is matched with intrusion detection rules, but it is not performed through automatic CVE (Common Vulne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F12/14
CPCH04L63/1408H04L63/1433H04L12/22
Inventor CHOI, BYEONG CHEOLSEO, DONG IL
Owner CHOI BYEONG CHEOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products